First published: Wed Mar 03 2004(Updated: )
Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mutt | =1.3.12.1 | |
Mutt | =1.2.5.5 | |
Mutt | =1.3.27 | |
Mutt | =1.3.16 | |
Mutt | =1.2.5 | |
Mutt | =1.3.25 | |
Mutt | =1.4.1 | |
Mutt | =1.3.22 | |
Mutt | =1.2.5.12 | |
Mutt | =1.2.5.1 | |
Mutt | =1.2.5.4 | |
Mutt | =1.3.28 | |
Mutt | =1.3.24 | |
Mutt | =1.4.0 | |
Mutt | =1.2.1 | |
Mutt | =1.3.17 | |
Mutt | =1.2.5.12_ol | |
Mutt | =1.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0078 is classified as a critical vulnerability due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2004-0078, you should upgrade to Mutt version 1.4.2 or later.
CVE-2004-0078 affects Mutt versions 1.4.1 and earlier, including 1.3.12.1, 1.2.5.5, and others.
CVE-2004-0078 is a buffer overflow vulnerability.
Yes, CVE-2004-0078 can be exploited remotely through specially crafted mail messages.